城市(city): unknown
省份(region): unknown
国家(country): United States of America (the)
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 216.55.137.1
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 38666
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;216.55.137.1. IN A
;; AUTHORITY SECTION:
. 499 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2023052400 1800 900 604800 86400
;; Query time: 71 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed May 24 14:51:13 CST 2023
;; MSG SIZE rcvd: 105
1.137.55.216.in-addr.arpa domain name pointer gw.dedicated.codero.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
1.137.55.216.in-addr.arpa name = gw.dedicated.codero.com.
Authoritative answers can be found from:
IP | 类型 | 评论内容 | 时间 |
---|---|---|---|
181.226.106.202 | attack | Honeypot attack, port: 445, PTR: PTR record not found |
2020-01-23 12:42:00 |
172.247.123.155 | attackbotsspam | Unauthorized connection attempt detected from IP address 172.247.123.155 to port 2220 [J] |
2020-01-23 13:10:02 |
201.243.109.205 | attack | Honeypot attack, port: 139, PTR: 201-243-109-205.dyn.dsl.cantv.net. |
2020-01-23 13:11:19 |
217.182.199.4 | attackspam | firewall-block, port(s): 4122/udp |
2020-01-23 13:01:33 |
98.166.161.245 | attackbotsspam | port |
2020-01-23 12:59:08 |
94.179.129.139 | attackbots | Unauthorized connection attempt detected from IP address 94.179.129.139 to port 22 [J] |
2020-01-23 12:48:47 |
190.121.135.2 | attackspam | Honeypot attack, port: 445, PTR: 1901211352.ip48.static.mediacommerce.com.co. |
2020-01-23 13:09:14 |
14.243.38.13 | attackbotsspam | Unauthorized connection attempt from IP address 14.243.38.13 on Port 445(SMB) |
2020-01-23 13:02:29 |
58.186.114.215 | attackspam | Honeypot attack, port: 445, PTR: PTR record not found |
2020-01-23 13:04:56 |
95.45.48.73 | attackbotsspam | Honeypot attack, port: 5555, PTR: 95-45-48-73-dynamic.agg2.rcm.rsl-rtd.eircom.net. |
2020-01-23 12:35:58 |
187.211.123.159 | attackbotsspam | Unauthorized connection attempt detected from IP address 187.211.123.159 to port 81 [J] |
2020-01-23 12:36:11 |
200.68.9.242 | attackbotsspam | Honeypot attack, port: 81, PTR: PTR record not found |
2020-01-23 13:11:37 |
197.248.16.118 | attackbotsspam | Jan 23 05:57:18 pkdns2 sshd\[64063\]: Invalid user speedtest from 197.248.16.118Jan 23 05:57:20 pkdns2 sshd\[64063\]: Failed password for invalid user speedtest from 197.248.16.118 port 33436 ssh2Jan 23 06:01:22 pkdns2 sshd\[64299\]: Invalid user newtest from 197.248.16.118Jan 23 06:01:24 pkdns2 sshd\[64299\]: Failed password for invalid user newtest from 197.248.16.118 port 34876 ssh2Jan 23 06:05:23 pkdns2 sshd\[64536\]: Invalid user lois from 197.248.16.118Jan 23 06:05:26 pkdns2 sshd\[64536\]: Failed password for invalid user lois from 197.248.16.118 port 36316 ssh2 ... |
2020-01-23 12:52:18 |
118.25.27.67 | attackspambots | Unauthorized connection attempt detected from IP address 118.25.27.67 to port 2220 [J] |
2020-01-23 12:48:26 |
128.72.202.141 | attack | Honeypot attack, port: 445, PTR: 128-72-202-141.broadband.corbina.ru. |
2020-01-23 12:33:23 |